dc.description.abstract |
Today is the time of the Internet of Things (IoT),
a great many devices, for example, smart homes, smart
retail, smart phone identification, smart lighting, and
so forth are being associated with the Internet. There
are different devices that are interconnected to a
different device on the Internet of things that offer
various procedures and forms. The Forensic specialist
will have many difficulties to look into gathering the
bit of proof from the tainted segment on the IoT
devices and furthermore will confront complexities to
break down those proof. This paper introduces a UDP
flood attack begins by sending countless UDP packet
from various IP addresses. The graphical proof is
likewise displayed for the DDOS attack utilizing UDP
packet flooding. We will do the network forensics
investigation for flooding attacks on IoT environments
Using Wireshark |
en_US |